By: TMCnet Special Guest With the explosion of mobile devices and mass migration to the cloud enabling remote access to business applications and data, the need for strong user authentication has never been greater.

By: Doug Mohney Almost lost in the Federal Communication Commission's announcement that it plans to put tighter, Title II utility-style regulation onto broadband carriers is a second notice that the commission wants to override state laws preventing cities from offering high-…

By: Peter Bernstein I am going to admit to being surprised by the U.S. Federal Communications Commission's (FCCs) Open Internet decision. FCC Chairman Tom Wheeler's new net neutrality regime got the headlines it deserved, and not part of the surprise …

By: TMCnet Special Guest The growing reliance on cloud-based business applications and mobile devices creates significant challenges for IT professionals who must establish policies for identity and access management (IAM). An estimated 50 to 80 percent of cloud-based applications used within the …

By: Tony Schueth Interoperability clearly is the word of the day as we begin 2015. Until now, it has been one of the warm and fuzzy words bantered about in our industry and often associated with health care reform or used as a …